Construction site cable anti-theft management system
[ad_1]
Construction site cable anti-theft management system
|
content |
Key words | Construction site cable anti-theft, construction cable anti-theft, wire anti-theft, construction site anti-theft, construction site cable anti-theft |
Introduction | Using the technology of RFID Internet of Things, conduct anti-theft monitoring and management of cables and wires on construction sites, and feedback the online status of each layer of cables in real time. |
publisher |
Guangzhou Zhongzhi Internet of Things Technology Co., Ltd. |
1. Demand background
The theft of cables at construction sites has always been a headache. Due to the small number of on-site management personnel at construction sites, the uneven quality of workers, and the opening of the building to the outside world, thefts of cables have occurred frequently. The direct losses ranged from tens of thousands to millions. At present, there is no perfect solution to this problem in the market.
Guangzhou Zhongzhi Internet of Things Technology Co., Ltd. joined hands with China Construction Fourth Engineering Bureau to develop a “cable anti-theft management system” using RFID Internet of Things technology.
2. Instructions for use
1. Card Issuing Process
Figure 1 Card issuance process
As shown in Figure 1, the computer is connected to the card issuer through the USB interface, and the computer runs the “China Construction Fourth Bureau Site Cable Anti-theft System” software. The system binds the tag ID number to the location where it is installed, and uploads the relevant information to On the cloud server.
2. Install the label
Figure 2 Schematic diagram of anti-theft label installation
The anti-theft label that has been issued needs to be installed at the designated monitoring location. You can choose glue, screws, cable ties and multiple quick installation methods. When installing, try not to place the label in a metal environment around it.
3. Install the monitoring host
Figure 3 Monitoring host installation diagram
As shown in Figure 3, installing a monitoring host outside the wall of the management office responsible for communicating with the anti-theft tag is the core of the entire system, and the security of its installation location must be fully guaranteed.
3. System introduction
Figure 4 Description of the monitoring network
As shown in Figure 4, the monitoring host is responsible for receiving the information sent by the anti-theft tag. If the distance between the tag and the host is too far, it can be used as a signal relay through a repeater. Once the anti-theft tag or repeater is moved illegally, the monitoring host will upload the alarm signal to the system.
An alarm can be installed in the office. Once the system receives an alarm signal, the alarm will sound an alarm. Both the repeater and the monitoring host are designed with a backup power supply. Once the power is cut off at the construction site, the system can be guaranteed to work normally for one day.
Figure 5 System topology diagram
The monitoring host is connected to the server via 3G wireless. After the administrator’s mobile phone installs the system APP, as long as there is a network, he can log in to the system through his account and password to check the anti-theft situation at the construction site in real time. Once an alarm signal is uploaded, the relevant administrator The mobile phone will immediately receive detailed alarm information, and the alarm in the on-site office will immediately sound the alarm.
Four, equipment introduction
1. Card Issuer
Figure 6 Three views of the card issuer
The card issuer is connected to the computer through a USB interface to read the ID number of the anti-theft tag. The administrator then enters the specific installation location of the anti-theft tag into the system and binds it with the ID number of the tag. After the tag shell is marked, the card issuance is completed. The card issuer can repeatedly issue the anti-theft label, which is convenient for repeated use. Appearance size: 120mm×120mm×24mm.
2. Anti-theft label
As shown in Figure 7, a tag is installed at a key position on each floor of the building. The tag contains a smart chip, MCU processor, and disposable lithium battery, which can be used for 2 years. The installation method can adopt PVC glue sticking, screw left and right reinforcement, and cable tie installation.
The anti-theft tag has a waterproof and dust-proof design. Once the external vibration is felt and reaches a certain level, it will send a super-distance signal to the monitoring host to warn.
Figure 7 Three views of anti-theft label
The technology adopted by the anti-theft tag is similar to that of Bluetooth and WIFI, and the radiation to the human body is only 1/10 of that of the mobile phone, so there is no need to worry about its impact on the body. The specific size of the label is 70mm×40mm×7mm, and the thickness of the battery part is 20mm.
Considering that the tag may be moved during the construction process, all systems can arm and disarm a certain anti-theft tag or a tag on a building to reduce false alarms.
3. Monitoring the host
Figure 8 Three views of the monitoring host
The monitoring host has the effect of waterproof and dustproof, and can be installed outdoors, with hoop installation, and 220V power supply. Communicate with the server via 3G wireless. When the anti-theft tag or repeater moves, the monitoring host will receive the alarm signal, with close to 100% accuracy and extremely fast response speed. The external dimensions of the base station are: 26.1cm×18.2cm×13cm.
Recycling: After the delivery of the building is completed, the office monitoring host can be removed and installed on a new construction site to recycle resources.
4. Repeater
The purpose of the repeater is to amplify the signal. When the environment on the construction site is bad, a repeater can be installed near it. Considering the convenience of installation, the repeater directly uses 220V power supply, plug and play.
The repeater has a built-in anti-theft module and backup battery. When it is moved illegally, the repeater will also send an alarm signal to the monitoring host. The appearance of the repeater is shown in Figure 9.
Recycling: After the building is delivered, the repeater can be disassembled and installed on a new construction site to recycle resources.
Figure 9 Three views of repeater
5. Alarm
Figure 10 Three views of the alarm
The alarm is also wirelessly connected to the monitoring host and works when powered on. It is recommended to install it in the office for timely reminders. The alarm is also equipped with a backup power supply and an anti-theft module. When being moved illegally, the alarm itself will alarm and upload the alarm signal to the system. The appearance is shown in Figure 10.
Recycling: After the building is delivered, the alarm can be disassembled and installed on a new construction site to recycle resources.
Five, software interface
1. Home
Figure 11 Home page
As shown in Figure 11, after logging in to the account and password, you can see all the basic information on the home page, such as tag ID number, installation location, alarm, arming and disarming, online status, responsible person, and contact information. The administrator usually only needs to see this Page is fine.
If an alarm message comes up, the color of the event will become darker, and there will be a sound reminder at the same time.
2. Location information entry
Figure 12 Entry of location information
As shown in Figure 12, before installation, the administrator needs to bind the ID number of the tag with the location information of the specific installed floor, and the system can assign different persons in charge according to the floor.
When the label needs to be updated, you can press the “modify” button to modify it.
3. Alarm information table
Figure 13 Alarm information table
The alarm information table contains all alarm events, the time record is specific to the second, and the remarks can indicate the processing status of the alarm event, which is convenient for the administrator to view for a period of time.
4. Arming and disarming settings
Figure 14 Arming and disarming settings
Considering that the alarm signal may be triggered by mistake during floor construction, the system can be disarmed in advance. The administrator can arm and disarm for each building and each floor. In addition, the system provides automatic arming settings. After the administrator selects a time, the system will automatically resume all arming tasks at that moment.
5. Online inventory
Figure 15 Inventory of online situation
The anti-theft label can carry out an online inventory operation every hour to ensure that the monitoring equipment is normal. If there is an abnormal anti-theft label in the inventory, the system will darken the color of the label to facilitate the administrator to check the situation on the spot.
When you need to quickly check the location of a specific label, you can use the “Search” function. After entering the label ID number, click “Search” to search for all the information of the label.
6. Advantages and highlights
1. No wiring and labor saving
The system adopts wireless networking communication, which fully guarantees the portability of installation and the convenience of maintenance, as well as the subsequent recyclability. The location tag is small and light, with strong signal penetrability, and is specially customized for the construction site. Paste it directly to use.
2. Strong endurance
The anti-theft tag has the characteristics of high sensitivity and low power consumption, and the sensitivity can be adjusted according to the construction site environment. The label can be used for up to 2 years. The system’s integrated hardware product design features: first, to ensure that the monitoring can continue in the event of a power failure; second, after the delivery of the real estate is completed, it can be transplanted to a new construction site for secondary use.
3. Design for removing dead corners
Since the wireless signal is sent out in the form of spherical waves, the transmission distance is about 500 meters in the construction site environment, which can meet more than 95% of point-to-point communication. Where the signal is weak, a repeater can be added to enhance the signal, expand the transmission distance, and make the monitoring angle of view reach 100%.
4. Low radiation impact
Relative to passive tags, active tags can provide energy by themselves, so that the transmission power of the monitoring host and anti-theft tags can be made very small, which is about one-tenth of the radiation of the mobile phone.
5. Real-time monitoring
The system design adopts the B/S architecture. The administrator only needs to log in to the account and password. When there is a network, they can log in to the system through a computer or mobile phone, and monitor the theft in unlimited locations around the clock.
Seven, equipment list
Table 1 List of equipment for 3 buildings
Serial number | Equipment name | quantity | instruction |
1 | Card issuer | 1 | Binding the installation information of the anti-theft label. |
2 | Copyright label | 144 | It is planned to install one on each floor, each with 48 floors. |
3 | Monitoring host | 1 | Installed on the outer wall of the office. |
4 | Repeater | 3 | Each building plans to use one. |
5 | Alarm system | 1 | 1 for office. |
6 | remote control | 1 | It can be used with an alarm to arm and disarm on site. |
7 | Monitoring system software | 1 | Contains mobile phone application APP, anytime, anywhere, portable monitoring. |
[ad_2]